踹哈公寓 – Telegram
踹哈公寓
4.1K subscribers
589 photos
19 videos
307 files
357 links
Download Telegram
Channel photo removed
Channel photo updated
Channel name was changed to «🕯»
踹哈公寓 pinned Deleted message
Channel photo updated
Channel name was changed to «🥵将军走此小道🥵»
CVE-2023-46747
F5-big-ip远程代码执行漏洞


漏洞描述:

F5 BIG-IP通过Apache httpd转发AJP协议时使用的ProxyPassMatch路由规则将所有HTTP请求路由到后端的不同服务。其中对“/tmui”这个端点的请求最终被转发到在端口8009上侦听的AJP(ApacheJServProtocol)服务。F5会检查侦听该端口的进程再将请求引导到相关的Java进程,(在“/usr/local/www/tmui”目录中,servlet的“web.xml”文件包含相关处理程序的所有映射信息)。正常AJP消息处理机制是把httpd服务发送到后端AJP侦听器的二进制AJP消息用魔术字节“0x12”“0x34”开头,后跟两个字节的消息长度。消息的第5个字节包含“Code”,这是一个确定AJP请求类型的值。HTTP转发请求的代码为值“0x2”。HTTP转发请求的第6个字节对请求的HTTP动词进行编码。GET请求为0x2,POST请求为0x4,依此类推。其余消息数据对AJP属性和HTTP请求信息进行编码,从而可以绕过权限验证。可能导致威胁者通过管理端口或自身IP地址对BIG-IP系统进行网络访问,从而执行任意系统命令。

受影响版本:

BIG-IP Next
BIG-IQ Centralized Management
F5 Distributed Cloud Services
F5OS
NGINX
Traffix SDC产品

POC:

POST /mgmt/shared/authn/login HTTP/1.1
Host: xxx
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Length: xx
Content-Type: application/json
Accept-Encoding: gzip, deflate
Connection: close

{"username":"xxx", "password":"xxx"}

前俩天买了这洞的只能说大怨种了,呃呃
3👍1
👍1
踹哈公寓 pinned «如何评价淘宝京东大规模泄露数据»
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
全网封杀的珍贵资源

孙笑川抽象圣经v1.0全程未消音版本
9👍4😁1